Top Stories


Boon Edam’s North American Headquarters Receives SHARP Certificate at Formal Ceremony

Boon Edam Inc. has been presented with a Safety and Health Achievement Recognition Program (SHARP) certificate during a formal ceremony on March 2.

Motorola Solutions Acquires Ava Security Limited

Motorola Solutions today announced it has acquired Ava Security Limited, a global provider of cloud-native video security and analytics, based in London.

Keynote Series Speaker Lineup Announced for ISC West 2022

ISC West, in collaboration with premier sponsor the Security Industry Association (SIA), announces this year’s Keynote Series speaker lineup ahead of the March 22-25 event in Las Vegas



Resideo Acquires Arrow Wire & Cable

Resideo has acquired privately held Arrow Wire & Cable, based in Chino, Calif. Arrow was founded in 1989 and is a leading regional distributor of data communications, connectivity and security products.

Going Beyond Security

Going Beyond Security

Houston, the most ethnically diverse metropolitan area in the country, is the fourth most populous city in the nation with an estimated population of approximately 2.3 million residents as of April 2020. Houston is home to 24 headquarters of Fortune 500 companies in the larger metropolitan area and continues to expand.

Overcoming the Problems

Overcoming the Problems

What you are about to read is like an old-fashion action-thriller book or movie. There is a very mean-spirited evil villain, and, happily, a protagonist to save the day.

Manage video and alarms with VSaaS

Manage video and alarms with VSaaS

Each year demand for video surveillance continues to grow, as organizations seek to increase the security and safety of people and property. Searching for a solution that scales with their operations while minimizing upfront investments is challenging for companies with many locations.

Continuing Camera Advancement

Video surveillance technology has come a long way over the past few decades, evolving into the intelligent network system endpoints they are today.

Unified Solutions and Emerging Technologies

Unified Solutions and Emerging Technologies

Large scale infrastructure environments, like airports and critical infrastructure sites, present a physical security challenge.

Protecting a Budding Industry

The legalized cannabis industry is one of the fastest-growing industries in North America, and when it comes to the security of the facilities that grow it, the stakes are high.

Curbing Security Threats

Curbing Security Threats

Outside of physical attacks, when natural gases are extracted, transported, and refined, invisible gas leaks pose a quieter and consistently costly threat. In fact, the United States oil and natural gas industry loses approximately 1.4 to 2.3 percent of its natural gas from operations due to leaks, each year, according to the EPA.

The Rush to Digitalization

Over the last year, there has been unwavering focus on digital transformation driven by the need for greater connectivity.

Reducing Nuisance Alarms

Critical infrastructure sites need reliable, cost-effective physical security solutions.

A Medical Enhancement

New mandates require hospitals to implement various regulations and seismic safety precautions by 2030. This ultimately led to the construction of a state-of-the-art hospital for the North Bay region, and in the fall of 2020, MarinHealth announced the official opening of Oak Pavilion

If Things Can Go Wrong, They Will

Reading is a great pastime, and I do a lot of it. It’s part of my job. For fun, I read, but not the usual news; I like to focus on obituaries (just checking to make sure I’m not there) and lists. I like the Top Ten lists of just about anything.

Beyond Buzz

Beyond Buzz

Artificial Intelligence (AI), Machine Learning, Deep Learning, and Computer Vision are the latest buzzwords spreading throughout the security industry.

Winners at We-Ko-Pa

Winners at We-Ko-Pa

The number of cameras available from Hanwha Techwin was a key differentiator for the We-Ko-Pa Resort as it enabled them to choose the right camera for every situation.

Evaluating Access Control

The pandemic continues to challenge businesses in terms of security, safety and changing working conditions.

Securitas Launches Technology Life Cycle Management Tool SecureStat

Security Electronic Security, Inc. (SES) is pleased to announce SecureStat® 360 is now fully available for SES clients. Introduced last fall at the Global Security Exchange (GSX) show, SecureStat 360 provides a complete view of a company’s security technology life cycle from product installation to replacement.

Ransomware Attacks Rise Almost 93% in 2021, According to New Research

Global cyber security and risk mitigation expert NCC Group has revealed that ransomware attacks almost doubled in 2021, rising 92.7% year-on-year, according to its 2021 Annual Threat Monitor

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3